Adaptively secure, splittable, and robust threshold unsigncryption
Abstract As a variant of the signcryption scheme, threshold unsigncryption operates among multiple receiver members through a (t, n) threshold process during the unsigncryption phase to improve security and robustness, and has been widely deployed in various applications such as cloud computing, blo...
Saved in:
| Main Authors: | , , , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
SpringerOpen
2025-05-01
|
| Series: | Cybersecurity |
| Subjects: | |
| Online Access: | https://doi.org/10.1186/s42400-024-00344-3 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850190746200571904 |
|---|---|
| author | Yuxin Tong Shimin Li Zhiwei Wang Rui Zhang Rui Xue |
| author_facet | Yuxin Tong Shimin Li Zhiwei Wang Rui Zhang Rui Xue |
| author_sort | Yuxin Tong |
| collection | DOAJ |
| description | Abstract As a variant of the signcryption scheme, threshold unsigncryption operates among multiple receiver members through a (t, n) threshold process during the unsigncryption phase to improve security and robustness, and has been widely deployed in various applications such as cloud computing, blockchain, and electronic auctions. However, existing schemes only consider security under a limited static corruption model, where the adversary selects which parties to corrupt before the protocol begins. As a result, these schemes lack the flexibility to address more complex attack forms posed by real-world adversaries. To solve this issue, it is worth investigating threshold unsigncryption schemes with adaptive security. In this paper, we propose the first provably secure (t, n) threshold unsigncryption scheme in the standard model against adaptive corruption adversaries who can corrupt parties at any time during protocol execution. The main contributions include: First, we provide the formal syntactic definition and security model of threshold unsigncryption schemes under the adaptive corruption model. Second, we employ the dual system technique to formally prove that the proposed scheme can achieve adaptive security in the standard model. Notably, our scheme is equipped with valuable properties such as non-interactivity, robustness, public verifiability, and splittable unsigncryption, significantly enhancing usability and functional completeness. Besides, we implement the proposed scheme on two types of elliptic curve groups with different security levels and evaluate its practical performance under different thresholds. Experiments demonstrate that on a composite order group with 80-bit security, a single receiver only takes 16.61 s to perform the threshold unsigncryption phase when the number of receivers n is 20 and the threshold t reaches up to 18. As a pioneering adaptively secure threshold unsigncryption scheme, our work not only establishes a benchmark for future proposals but also broadens its application in scenarios requiring high-security levels and flexible key management, such as electronic voting. |
| format | Article |
| id | doaj-art-8e744c0c9a6740b7939cd19a46b182a6 |
| institution | OA Journals |
| issn | 2523-3246 |
| language | English |
| publishDate | 2025-05-01 |
| publisher | SpringerOpen |
| record_format | Article |
| series | Cybersecurity |
| spelling | doaj-art-8e744c0c9a6740b7939cd19a46b182a62025-08-20T02:15:11ZengSpringerOpenCybersecurity2523-32462025-05-018112410.1186/s42400-024-00344-3Adaptively secure, splittable, and robust threshold unsigncryptionYuxin Tong0Shimin Li1Zhiwei Wang2Rui Zhang3Rui Xue4Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of SciencesCETC Cyberspace Security Technology Co., Ltd.Key Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of SciencesKey Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of SciencesKey Laboratory of Cyberspace Security Defense, Institute of Information Engineering, Chinese Academy of SciencesAbstract As a variant of the signcryption scheme, threshold unsigncryption operates among multiple receiver members through a (t, n) threshold process during the unsigncryption phase to improve security and robustness, and has been widely deployed in various applications such as cloud computing, blockchain, and electronic auctions. However, existing schemes only consider security under a limited static corruption model, where the adversary selects which parties to corrupt before the protocol begins. As a result, these schemes lack the flexibility to address more complex attack forms posed by real-world adversaries. To solve this issue, it is worth investigating threshold unsigncryption schemes with adaptive security. In this paper, we propose the first provably secure (t, n) threshold unsigncryption scheme in the standard model against adaptive corruption adversaries who can corrupt parties at any time during protocol execution. The main contributions include: First, we provide the formal syntactic definition and security model of threshold unsigncryption schemes under the adaptive corruption model. Second, we employ the dual system technique to formally prove that the proposed scheme can achieve adaptive security in the standard model. Notably, our scheme is equipped with valuable properties such as non-interactivity, robustness, public verifiability, and splittable unsigncryption, significantly enhancing usability and functional completeness. Besides, we implement the proposed scheme on two types of elliptic curve groups with different security levels and evaluate its practical performance under different thresholds. Experiments demonstrate that on a composite order group with 80-bit security, a single receiver only takes 16.61 s to perform the threshold unsigncryption phase when the number of receivers n is 20 and the threshold t reaches up to 18. As a pioneering adaptively secure threshold unsigncryption scheme, our work not only establishes a benchmark for future proposals but also broadens its application in scenarios requiring high-security levels and flexible key management, such as electronic voting.https://doi.org/10.1186/s42400-024-00344-3Threshold unsigncryptionAdaptive securitySplittable unsigncryption |
| spellingShingle | Yuxin Tong Shimin Li Zhiwei Wang Rui Zhang Rui Xue Adaptively secure, splittable, and robust threshold unsigncryption Cybersecurity Threshold unsigncryption Adaptive security Splittable unsigncryption |
| title | Adaptively secure, splittable, and robust threshold unsigncryption |
| title_full | Adaptively secure, splittable, and robust threshold unsigncryption |
| title_fullStr | Adaptively secure, splittable, and robust threshold unsigncryption |
| title_full_unstemmed | Adaptively secure, splittable, and robust threshold unsigncryption |
| title_short | Adaptively secure, splittable, and robust threshold unsigncryption |
| title_sort | adaptively secure splittable and robust threshold unsigncryption |
| topic | Threshold unsigncryption Adaptive security Splittable unsigncryption |
| url | https://doi.org/10.1186/s42400-024-00344-3 |
| work_keys_str_mv | AT yuxintong adaptivelysecuresplittableandrobustthresholdunsigncryption AT shiminli adaptivelysecuresplittableandrobustthresholdunsigncryption AT zhiweiwang adaptivelysecuresplittableandrobustthresholdunsigncryption AT ruizhang adaptivelysecuresplittableandrobustthresholdunsigncryption AT ruixue adaptivelysecuresplittableandrobustthresholdunsigncryption |